Any computer connected to a network is subject to being compromised.
As for encrypting email? That’s pointless as the NSA has a budget to crack encryptions and they’ll spend billions to break encryptions while most people spend a few bucks to nothing at all (open source) to buy encryption.
The one-time cipher pad is still the single most reliable way to defeat spies. Book ciphers are simple and easy to use and are practically impenetrable especially if you use obscure books as your reference.
Right!...further the new Data Bases storing all this data are also about designing and breaking various codes and encryptions.
People just need to realize there is no place to hide your stuff...if they want to get it or in they will.
But really...we’ve known this all along. After all...how do people feel when they’re on line and the updates start rolling in?
Also.. keep your messages short. Even the best cryptanalyst in the world can’t crack a cipher if it is too short to analyze for patterns.
If you use AES-128 and up and a long 14+ character random password they won’t crack it. If you use RSA or any other public key method for the password, make sure it’s at least 4096 bit if RSA or 521 bit for Elliptic curve. The 2nd method’s far better in that scenario.
Until quantum computers really get going, AES-128 should be ok. If you think they’ve got them, then go with AES-256 for sure.